The disclosure is related to satellite navigation receivers.
Satellite constellations have replaced the stars as reference points for navigation. The global positioning system (GPS) has been joined by other global navigational satellite systems (GNSS) including GLONASS, Galileo, and BeiDou. The Iridium constellation, while not primarily intended for navigation, provides voice and data service worldwide.
Many signals transmitted by GNSS are public. For example, GPS receivers have complete knowledge of the C/A code sent from GPS satellites. Receivers correlate internally generated C/A code replicas against C/A code signals received over the air to compute pseudoranges. On the other hand, GNSS also transmit secret codes. Galileo Public Regulated Service encrypted codes and GPS P(Y) code are examples of secret codes. P(Y) code replicas can be generated by properly keyed Selective Availability/Anti-Spoofing Module (SAASM) chips which are tightly controlled by the US military. Without a timely and correct P(Y) code replica, however, no pseudoranges can be computed and P(Y) signals are of limited use to a receiver.
Tremendous progress has been made in GNSS signal accuracy, availability and integrity; so much so that many people take GNSS service for granted and are unaware of how extensive their dependence on GNSS signals has become. Dependence on GNSS, for cellular phone system time distribution as just one example, creates a new area of concern: signal authenticity. GNSS signal simulators have become relatively inexpensive and knowledge of how to use them to spoof a GNSS receiver is spreading rapidly. A university team recently demonstrated taking control of an unmanned aerial vehicle by sending fake GPS signals to it.
A receiver that has access to secret signals cannot be spoofed because would-be malefactors do not know the secret codes. However, secret codes by definition cannot be widely disseminated lest they fall into the wrong hands. Satellite receivers for data services such as those provided by Iridium are also candidates for spoofing. Data receivers pay for access to secret satellite signals and thus such access must be controlled.
Hence, what are needed are satellite receivers whose access to secret signals can be precisely controlled or regulated without compromising secrecy.
Controlled access satellite navigation receivers are designed to have incomplete knowledge of secret codes transmitted by satellites. This incomplete knowledge allows only intermittent position determination. As described below, however, incomplete secret codes and the intermittent positions they provide are useful for authenticating navigation signals or controlling access to private satellite services.
As used herein, “position” means ({right arrow over (x)}, t) or {right arrow over (x)} or t, where {right arrow over (x)}=(x, y, z). Discussion of position pertains equally to {right arrow over (x)} or t or components thereof. Further, an “INS” (inertial navigation system) by definition includes an IMU (inertial measurement unit) and/or a clock. Thus an INS estimates position. An IMU may provide accelerometer, gyroscope, altimeter and/or compass measurements.
The receiver correlates its short code segments with the code received from the satellite to obtain satellite pseudoranges intermittently. This incomplete position information may then be used to authenticate or supplement alternate means of navigation such as an INS or a GNSS public code receiver. Authentication scenarios in which controlled access satellite receivers are useful include missile guidance, positioning for individual soldiers, and aircraft navigation. In each of these cases, a receiver with full knowledge of a secret code is impractical or undesirable.
GPS SAASM chips needed for generating P(Y) code are subject to US military control which limits their distribution. No matter how beneficial it might be to offer foreign airliners GPS spoofing protection when landing in the United States, as an example, they are not going to be given access to the P(Y) code. SAASM packaging is also bulky and increases the size and weight of GPS receivers. Thus a soldier equipped with non-SAASM anti-spoofing capability saves both weight and the worry associated with keeping equipment out of enemy hands. It is not possible to interpolate or extrapolate P(Y) code from these short segments. Thus, a controlled access receiver with short future P(Y) code segments does not present a security concern. (Past P(Y) code can be recorded directly from satellites. That doesn't help predict future code, in part because P(Y) encryption keys keep changing.)
Private satellite position (i.e. ({right arrow over (x)}, t) or components thereof) services may use controlled access receivers to provide varying levels of paid service. For example, a time service may be based on a continuous code broadcast by satellites. Controlled access receivers, having only short segments of the code, may update their internal clocks intermittently. Premium subscribers may be given more frequent and/or longer code segments while basic subscribers are given less frequent and/or shorter code segments. Premium subscribers' receivers then provide better accuracy than those of basic subscribers because their internal clocks are updated more often and/or with more precise time information.
In
Secret codes such as those of
Antenna 310 receives signals from satellites. An RF front end 306 and A-to-D converter 307 shift the satellite signals to baseband and transform them into the digital domain via sampling. These digital signals are then input to correlator 315. Secret code segment generator or secret code segment memory 320 produces segments of secret code such as 325. This generator or memory is incapable of generating continuous secret code or code segments of indefinite length. Applications involving short segments of GPS P(Y) code may be based on secret code memory that only stores short segments. That way there is no possibility of reverse engineering a controlled access receiver to find out the complete P(Y) code. Applications involving paid access may be based on secret code generators that are enabled and disabled at specific times programmed with permission granted via password, as an example. In short, the controlled access of the receiver is derived from its limited ability to generate secret code.
Correlator 315 correlates the received, digitized signal with the internally generated (or recalled) secret code segment. The resulting pseudorange is sent to position filter 330 which receives local time estimates from clock 335. Secret code segment memory 320 may receive encrypted code segments over the air via antenna 310 and associated RF components.
The receiver as described up to this point provides intermittent position estimates. Although this may be sufficient in some cases, many applications demand continuous position updates. Such updates may be obtained from a public code GNSS receiver, an IMU, a combination of the two, and/or other sources.
Public code generator 340, public code 345 and correlator 350 are illustrated as optional components of receiver 305. They generate pseudoranges which may be additional inputs to position filter 330. The update rate of a public code GNSS receiver is typically about 1 Hz-10 Hz depending on the number and quality of correlators available. (Availability of the public code does not limit update rates as it is known completely.) Optional IMU 355 may also provide position updates to position filter 330. MEMS-based or other types of IMU can update position estimates as fast as 100 Hz or more. The accuracy of IMU position estimates drifts between GNSS updates, however.
Position filter 330 of
First, consider the case where receiver 305 may include IMU 355, but does not have a public code GNSS receiver (340, 345, 350). IMUs and clocks cannot be spoofed as they are self-contained; the accuracy of their position estimates drifts over time, however. In this case, position filter 330 uses intermittent secret code fixes (i.e. position estimates) to reset INS estimates. Uncertainty in INS position is periodically reduced to the uncertainty associated with a secret code fix whenever such a fix is available. In between secret code fixes, the uncertainty of INS estimates grows.
In a second scenario receiver 305 may include IMU 355 and does include public code GNSS receiver (340, 345, 350). If position filter 330 is configured to operate in the position domain, it compares public code fixes to secret code fixes. If public and secret code fixes are consistent with one another (e.g. their position uncertainties overlap or the distance between fixes is less than a threshold value), then the public code receiver has not been spoofed. In
Alternatively, position filter 330 may compare public and secret pseudoranges. If public and secret pseudoranges are consistent with one another (e.g. the distance between them is less than a threshold value), then the public code receiver has not been spoofed.
Although
A position filter operating in the measurement domain may perform step 520, computing an overall position estimate based on both public and secret pseudoranges and optionally on other information such as that provided by INS. On the other hand, a position filter operating in the position domain may perform step 525, computing separate position estimates based on public and secret pseudoranges considered separately. These public and secret position estimates may be compared in step 530.
A controlled access receiver may provide authentication by operating its position filter in the position domain and comparing public and secret position estimates. A controlled access receiver may correct drift (e.g. drift of a clock updated by a subscription satellite time service) by operating its position filter in the measurement domain and computing a best estimate of position based on all available information. Of course a receiver may be configured to operate in various modes at different times or to operate in various modes in parallel, simultaneously.
As described above, secret code segments allow a controlled access receiver to compute position updates only intermittently because of their low duty cycle. Secret code may be obtained for all times up to the present by listening to satellite broadcasts with a high-gain antenna; the secret aspect of a secret code is the ability to predict what it will be in the future. Code segments can be designed that reveal a secret code for the short times that they span, but are of no use in generating future code.
In
Security of code segments may be further strengthened by introducing omissions or errors. Code segment 610 contains omissions indicated by blank times such as 615. Code segment 620 contains errors indicated by perpendicular hatching, e.g. 625. The effect of errors and omissions is similar, although errors are harder to detect. If a shift register code segment contains at least one error every 2N chips, then its Nth order generator polynomial can't be determined. Errors are harder to detect if they are not uniformly distributed in the code.
Code segments 630, 635 and 640 are illustrated in a timeline to demonstrate a variable duration code segment strategy. Segment 640 is longer than segments 630, 635. This strategy is directed to levels of paid service rather than code security. Longer code segments enable more precise correlation measurements. A paid service may provide precise information less frequently than general information.
Controlled access satellite navigation receivers are capable of only intermittent position determination when limited to use of secret code segments only. This limitation, however, lets them take advantage of secret codes without compromising secrecy. Secret codes may be used to authenticate other navigation signals, such as public codes, or to provide levels of access to paid services.
The above description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the principles defined herein may be applied to other embodiments without departing from the scope of the disclosure. Thus, the disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Number | Date | Country | |
---|---|---|---|
61583598 | Jan 2012 | US |